USN-2501-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-2501-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-2501-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2501-1
Related
  • CVE-2014-8142
  • CVE-2014-9427
  • CVE-2014-9652
  • CVE-2015-0231
  • CVE-2015-0232
  • CVE-2015-1351
  • CVE-2015-1352
Published
2015-02-17T18:14:16.696290Z
Modified
2015-02-17T18:14:16.696290Z
Summary
php5 vulnerabilities
Details

Stefan Esser discovered that PHP incorrectly handled unserializing objects. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-8142, CVE-2015-0231)

Brian Carpenter discovered that the PHP CGI component incorrectly handled invalid files. A local attacker could use this issue to obtain sensitive information, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-9427)

It was discovered that PHP incorrectly handled certain pascal strings in the fileinfo extension. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-9652)

Alex Eubanks discovered that PHP incorrectly handled EXIF data in JPEG images. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-0232)

It was discovered that the PHP opcache component incorrectly handled memory. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-1351)

It was discovered that the PHP PostgreSQL database extension incorrectly handled certain pointers. A remote attacker could possibly use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2015-1352)

References

Affected packages

Ubuntu:14.04:LTS / php5

Package

Name
php5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.5.9+dfsg-1ubuntu4.6

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "php5-gd": "5.5.9+dfsg-1ubuntu4.6",
            "libphp5-embed": "5.5.9+dfsg-1ubuntu4.6",
            "php5-mysqlnd": "5.5.9+dfsg-1ubuntu4.6",
            "php-pear": "5.5.9+dfsg-1ubuntu4.6",
            "php5-cli": "5.5.9+dfsg-1ubuntu4.6",
            "php5-fpm": "5.5.9+dfsg-1ubuntu4.6",
            "php5-pspell": "5.5.9+dfsg-1ubuntu4.6",
            "php5-mysql": "5.5.9+dfsg-1ubuntu4.6",
            "php5-curl": "5.5.9+dfsg-1ubuntu4.6",
            "php5-ldap": "5.5.9+dfsg-1ubuntu4.6",
            "php5-pgsql": "5.5.9+dfsg-1ubuntu4.6",
            "php5-xsl": "5.5.9+dfsg-1ubuntu4.6",
            "php5-readline": "5.5.9+dfsg-1ubuntu4.6",
            "php5-enchant": "5.5.9+dfsg-1ubuntu4.6",
            "php5-common": "5.5.9+dfsg-1ubuntu4.6",
            "php5-dev": "5.5.9+dfsg-1ubuntu4.6",
            "libapache2-mod-php5filter": "5.5.9+dfsg-1ubuntu4.6",
            "php5": "5.5.9+dfsg-1ubuntu4.6",
            "php5-sybase": "5.5.9+dfsg-1ubuntu4.6",
            "php5-gmp": "5.5.9+dfsg-1ubuntu4.6",
            "php5-odbc": "5.5.9+dfsg-1ubuntu4.6",
            "php5-cgi": "5.5.9+dfsg-1ubuntu4.6",
            "php5-recode": "5.5.9+dfsg-1ubuntu4.6",
            "libapache2-mod-php5": "5.5.9+dfsg-1ubuntu4.6",
            "php5-sqlite": "5.5.9+dfsg-1ubuntu4.6",
            "php5-snmp": "5.5.9+dfsg-1ubuntu4.6",
            "php5-intl": "5.5.9+dfsg-1ubuntu4.6",
            "php5-xmlrpc": "5.5.9+dfsg-1ubuntu4.6",
            "php5-tidy": "5.5.9+dfsg-1ubuntu4.6"
        }
    ]
}